CMIT 321 Week 7 Quiz
points
Which of the following is not a Phishing countermeasure best
practices?
Do not click on any links included in an SMS message
Never call a number left in an SMS message
Quickly respond to the SMS message with a warning
Enable “block texts from the internet” feature from your provider
Question 0/5
2 points
Network-based points of attack include (choose all that apply):
Packet Sniffing
Man-in-the-Middle Attacks
SSLStrip
Rogue access points
Question 0/5
3 points
Which one of the following is not considered a benefit of BYOD?
Increased Security
Increased Productivity
Employee satisfaction
Work flexibility
,Question 0/5
4 points
,Rooting risks include which of the following? (choose all that apply)
bricking the phone
voiding the warranty
poor performance
malware infection
Question 0/5
5 points
is known as a type of attack which utilizes SMS messaging to
commit phishing attacks against mobile device users.
SMS SPAMMING
SMiShing
BlueSmacking
DroidPhishing
Question 0/5
6 points
The Android Runtime includes which of the following? (choose all that
apply)
core libraries
Bind IPC driver
Dalvik Virtual Machine
Flash memory driver
Question 0/5
7 points
, helps protect systems and users by restricting the
resources an app can access on a mobile platform.
Jailbreaking
Sandboxing
App Stores
SSL
Question 0/5
8 points
SPAM can include which of the following? (choose all that apply)
MMS
IM
TLS
SMS
Question 0/5
9 points
What is a network of many hacked smartphones called?
botnet
phone_net
4g-hacked
3gees
Question 0/5
10 points
points
Which of the following is not a Phishing countermeasure best
practices?
Do not click on any links included in an SMS message
Never call a number left in an SMS message
Quickly respond to the SMS message with a warning
Enable “block texts from the internet” feature from your provider
Question 0/5
2 points
Network-based points of attack include (choose all that apply):
Packet Sniffing
Man-in-the-Middle Attacks
SSLStrip
Rogue access points
Question 0/5
3 points
Which one of the following is not considered a benefit of BYOD?
Increased Security
Increased Productivity
Employee satisfaction
Work flexibility
,Question 0/5
4 points
,Rooting risks include which of the following? (choose all that apply)
bricking the phone
voiding the warranty
poor performance
malware infection
Question 0/5
5 points
is known as a type of attack which utilizes SMS messaging to
commit phishing attacks against mobile device users.
SMS SPAMMING
SMiShing
BlueSmacking
DroidPhishing
Question 0/5
6 points
The Android Runtime includes which of the following? (choose all that
apply)
core libraries
Bind IPC driver
Dalvik Virtual Machine
Flash memory driver
Question 0/5
7 points
, helps protect systems and users by restricting the
resources an app can access on a mobile platform.
Jailbreaking
Sandboxing
App Stores
SSL
Question 0/5
8 points
SPAM can include which of the following? (choose all that apply)
MMS
IM
TLS
SMS
Question 0/5
9 points
What is a network of many hacked smartphones called?
botnet
phone_net
4g-hacked
3gees
Question 0/5
10 points